Security

Security | News, how-tos, features, reviews, and videos

patching against ransomware
binary code, magnifying lens, skull and crossbones

tre18 007 nestnews2

Hijacked Nest camera blares warning about North Korean missiles headed to U.S.

A hacker hijacked a Nest security camera and blasted a warning about three North Korean intercontinental ballistic missiles headed to Los Angeles, Chicago, and Ohio.

Microsoft Office logo within an environment of abstract binary code with shield and lock.

Center for Internet Security releases Microsoft 365 benchmarks

Follow the guidance in this CIS document to configure Microsoft 365 security settings to the level that suits your organization.

Election 2016 teaser - Electronic voting security for digital election data

Why one of America’s top experts is hopeful for better election security

Voting machines and elections in general are still vulnerable to hacking, says Matt Blaze, but adoption of risk-limiting audits and software independence gives opportunity for improvement.

workspace organization rwh

The clean desk test

Ten ways a messy desk puts confidential information at risk.

5 password best practices unique passwords authentication

12 famous passwords used through the ages

Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones.

ermergency reponse siren

Data from smartwatch provided ‘key evidence’ against hitman

Police used data from a Garmin GPS watch to help get a man convicted for killing a crime boss known as Mr. Big.

Slack logo/wordmark [2019]

4 tips to mitigate Slack security risks

A Slack breach would be a nightmare in terms of exposed sensitive data. Here's how to lock down your Slack workspaces.

finger on keyboard with email icons floating out of monitor

Review: GreatHorn offers a better way to secure enterprise email

GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners.

phishing fishing lure bait binary hack security breach

What is spear phishing? Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone.

3 patch training update software band aid laptop with virus binary

Temporary micropatch available for zero-day Windows exploit

A publicly disclosed Windows zero-day vulnerability could allow attackers to take full control of systems once they compromise a low-privilege account. Here's a fix.

nordvpn

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now.

vulnerable cryptojacking hacking breach security

Rocke coinminer disables cloud protection agents

Cryptojacker's new shell script A7 can remove cloud security agents from Alibaba and Tencent to avoid coinminer detection.

jobs collaboration careers network

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments.

a hand holding a key moves toward an @ symbol with many locks

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability.

computer forensics

Building your forensic analysis toolset

Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach.

security audit - risk assessment - network analysis

How to enable audit logs in Microsoft Office 365

Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled.

virtual brain / digital mind / artificial intelligence / machine learning / neural network

Why AI-based threat detection hasn’t taken over the market … yet

Vendors, analysts and buyers differ on why threat detection AI isn't more widely adopted, but they agree that it needs to provide better insight to its inner workings.

facial recognition - biometric security identification

Police can't force you to unlock your phone with face, finger or any biometrics

A judge in California ruled that law enforcement officials can’t force people to unlock their smartphones with a finger or thumbprint, facial recognition, or even an iris.

Load More